Cyber Security

An important part of our CyberSAINTTM security platform is our FREE training. All DCG clients enjoy a new training method that you can leverage to better train and prepare your employees for social engineered cyber-attacks. The training is simple and fast, yet covers topics that will keep them safe. Are you onboarding new employees? ‘Get them trained and stay safe with DCG’s CyberSAINT FREE security training.

Contact Us

Forward thinking, and agile small businesses who need to leverage Information technology to beat their competitors count on DCG. DCG exists to help their clients choose, deploy, and manage proven technologies that achieve worry free, always on IT infrastructure.

Why You Should Talk About Ransomware with Your IT Support Provider in Los Angeles

If you’re afraid of ransomware attacks, now is the time to talk to your IT support provider in Los Angeles about the additional security measures you can take to protect your company. As recent as May 2017, the WannaCry ransomware cryptoworm was unleashed into the world, affecting at least 150 countries and 200,000 computers across the globe. WannaCry wreaked havoc by encrypting data in computers running Microsoft Windows OS, effectively taking it hostage. To decrypt the data, victims were demanded to pay ransom in the form of Bitcoin, an untraceable cryptocurrency.

Microsoft released emergency patches after a few days to address the vulnerability exploited by WannaCry. They rendered the virus powerless in already infected systems, while a kill switch prevented its spread to other computers.

Of course, that’s just WannaCry. Other cryptoworms have appeared since and will continue to do so. The question is— how prepared is your company to fight them all?

Let’s start with the basic, which is prevention. The best way to fight ransomware is to not get attacked in the first place by having the following safeguards applied with the help of your IT support provider in Los Angeles:

Antivirus and Antimalware Software

Every device should have one, whether it’s a supercomputer or a mobile phone. Free versions are available but for businesses; it’s advisable to go for the premium versions for added security features.

Network Protection

Firewall is necessary to prevent outside attempts from gaining access to internal systems. Network segmentation is also ideal for bigger systems to stop unintentional access between segments.

Intrusion Detection System

Network traffic should be continuously monitored for questionable activity. If one is detected, you should be able to receive alerts for it in real time to nip the threat in the bud.

Security Training

Staff should be trained on how to spot possible threats and also how to manage it as soon as there’s time to expound on it.

Backup and Recovery

In case you do become a target of ransomware, make sure you can afford not to pay the ransom. You can do this only with multiple backups which you can restore as needed.